Analysis
-
max time kernel
152s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
12-03-2024 19:26
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
c42ba8f065a2d3455c3ea2674751e3f7.dll
Resource
win7-20240221-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
c42ba8f065a2d3455c3ea2674751e3f7.dll
Resource
win10v2004-20240226-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
c42ba8f065a2d3455c3ea2674751e3f7.dll
-
Size
27KB
-
MD5
c42ba8f065a2d3455c3ea2674751e3f7
-
SHA1
423663dabace762490483b480b78cba4f114c576
-
SHA256
75c578c8965810b35d03d9f342195e01ea719b6293bca70c0c421a2b63cb2dc0
-
SHA512
1ccf8a466f846a509824daa47766e29ca940d6d51754228287d9f663ff3998cef7ea37e403980776f417f1546b5534c6eff603b8a386db37227465e3389dd4ab
-
SSDEEP
192:lVp5u+Mlk/Pa+L3cAvM4KIsm6pct5UYw/S:O+5/Pa+b6wh6pct5t
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4072 wrote to memory of 4396 4072 rundll32.exe 98 PID 4072 wrote to memory of 4396 4072 rundll32.exe 98 PID 4072 wrote to memory of 4396 4072 rundll32.exe 98
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c42ba8f065a2d3455c3ea2674751e3f7.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4072 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c42ba8f065a2d3455c3ea2674751e3f7.dll,#12⤵PID:4396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1404 --field-trial-handle=2328,i,5873823382323802923,13134441441264702821,262144 --variations-seed-version /prefetch:81⤵PID:2940